Alarm filtering


Alarm filtering

Alarm filtering, in the context of IT network management, is the method by which an alarm system reports the origin of a system failure, rather than a list of systems failed.

Example

Depending on the way a network is set up, the failure of one device (be it software or hardware) may cause another to fail. In this situation, a non-filtering alarm system will report both the original failure and the other device that failed. With alarm filtering, the alarm system is able to report the original failure with more priority than the subsequent failure, allowing a technician or repairman to concentrate on the cause of the issue, rather than wasting time trying to repair the wrong device.


Wikimedia Foundation. 2010.

Look at other dictionaries:

  • Intrusion detection system — An intrusion detection system (IDS) is a device or software application that monitors network and/or system activities for malicious activities or policy violations and produces reports to a Management Station.[1] Some systems may attempt to stop …   Wikipedia

  • Positive feedback — Alarm or panic can spread by positive feedback among a herd of animals to cause a stampede. Positive feedback is energy taken from the output of a system and reapplied to the input, which is phase congruent with the input signal. A system… …   Wikipedia

  • Type I and type II errors — In statistics, the terms Type I error (also, α error, or false positive) and type II error (β error, or a false negative) are used to describe possible errors made in a statistical decision process. In 1928, Jerzy Neyman (1894 1981) and Egon… …   Wikipedia

  • Event Correlation — is a technique for making sense of a large number of events and pinpointing the few events that are really important in that mass of information. It has been notably used in Telecommunications and Industrial Process Control since the 1970s, in… …   Wikipedia

  • Radar — For other uses, see Radar (disambiguation). A long range radar antenna, known as ALTAIR, used to detect and track space objects in conjunction with ABM testing at the Ronald Reagan Test Site on Kwajalein Atoll …   Wikipedia

  • Fuzzy locating system — Fuzzy locating is a rough but reliable method based on appropriate measuring technology for estimating a location of an object. The concept of precise or ‘’crisp locating’’ is replaced with respect to the operational requirements and the economic …   Wikipedia

  • Bluetooth — This article is about the electronic protocol. For the medieval King of Denmark, see Harald I of Denmark. Bluetooth logo Bluetooth is a proprietary open wireless technology standard for exchanging data over short distances (using short wavelength …   Wikipedia

  • Wireless security — An example wireless router, that can implement wireless security features Wireless security is the prevention of unauthorized access or damage to computers using wireless networks. Many laptop computers have wireless cards pre installed. The… …   Wikipedia

  • Bird vocalization — Bird song redirects here. For other uses, see Birdsong (disambiguation). A male Blackbird (Turdus merula) singing. Bogense havn, Funen, Denmark.   …   Wikipedia

  • Simultaneous localization and mapping — A robot built by Technische Universität Darmstadt maps a maze using a LIDAR …   Wikipedia